The current safety settings of your browser limit the execution of certain elements of this site. To offer the best possible support and to make the navigation on our site as convenient as possible for you it is mandatory to accept JavaScript in the settings of your browser.

To receive a flawless presentation please follow these instructions.

Mozilla Firefox

In the address bar, type "about:config" (with no quotes), and press Enter.
Click "I'll be careful, I promise"
In the search bar, search for "javascript.enabled" (with no quotes).
Right click or double click the result named "javascript.disabled" and change to "enabled".
JavaScript is now enabled.

Intel Firmware vulnerability INTEL-SA-00075 or CVE-2017-5689

Advisory note: Intel Firmware vulnerability

In an advisory note on May 1 2017, Intel published security information about an escalation of privilege vulnerability in Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small Business Technology.

There is an escalation of privilege vulnerability in Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small Business Technology versions firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 that can allow an unprivileged attacker to gain control of the manageability features provided by these products. This vulnerability does not exist on Intel-based consumer PCs.

An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel® Active Management Technology (AMT), Intel® Standard Manageability (ISM), and Intel® Small Business Technology (SBT).

Recommended steps:

Step 1: Determine if you have an Intel® AMT, Intel® SBA, or Intel® ISM capable system.

You can either:

1.

Consult the list of affected Fujitsu systems. This list provides an overview of Fujitsu affected systems introduced since 2012 and is updated regularly.

Utilize the Intel Detection Guide. Note: If your version is in the “Resolved Firmware” column then no further action is required.

Step 3: Download and install the firmware-/BIOS update package

Before proceeding, please check the expected availability of the firmware-/BIOS update package in the list of affected Fujitsu systems.To install and download the firmware update package, please go to Fujitsu support page and proceed with the following actions:

Select “Browse For Product”.

Select your “product line”.

Select your “product group” and “product family”.

Select your operating system.

Download and install the latest firmware-/BIOS update package from the „AMT“/„BIOS“ section (Firmware versions that resolve the issue have a four digit build number that starts with a “3” (X.X.XX.3XXX) Ex: 8.1.71.3608.).